General
-
Target
OfficeDocument.exe
-
Size
279KB
-
Sample
210304-dvs4y84q2a
-
MD5
b04e5c4ad1bc75a4a0cd5686e869acdb
-
SHA1
8a8fadeb752362fb265baa83f690bc4250556d33
-
SHA256
0e735a5773b8aa36e2a596ea6e468d75038db7dd644236b4eb745b66762f4ebf
-
SHA512
c06212a009af916a8dd707eca6d1e24cf28ce6b8726b51663562cbf1598138aef5d02b13c3ba2ad5c56940ddb47558224d6d7aa752347e0321267791e7141cfa
Static task
static1
Behavioral task
behavioral1
Sample
OfficeDocument.exe
Resource
win7v20201028
Malware Config
Extracted
buer
grandbanking-api.com
Targets
-
-
Target
OfficeDocument.exe
-
Size
279KB
-
MD5
b04e5c4ad1bc75a4a0cd5686e869acdb
-
SHA1
8a8fadeb752362fb265baa83f690bc4250556d33
-
SHA256
0e735a5773b8aa36e2a596ea6e468d75038db7dd644236b4eb745b66762f4ebf
-
SHA512
c06212a009af916a8dd707eca6d1e24cf28ce6b8726b51663562cbf1598138aef5d02b13c3ba2ad5c56940ddb47558224d6d7aa752347e0321267791e7141cfa
-
Buer Loader
Detects Buer loader in memory or disk.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-